Trust modelling and measurements for the security of information systems

被引:1
|
作者
Coste B. [1 ,2 ]
Ray C. [2 ]
Coatrieux G. [3 ]
机构
[1] Cyber Défense des Systèmes Navals, Ecole navale - CC 600, Brest Cedex 9
[2] Ecole navale - CC 600, Brest Cedex 9
[3] IMT Atlantique Technopole Brest-Iroise, CS 83818, Brest Cedex 3
来源
| 1600年 / Lavoisier卷 / 22期
关键词
Security of information systems; Trust;
D O I
10.3166/ISI.22.1.19-41
中图分类号
学科分类号
摘要
The proliferation of sensors and communicating devices has significantly enhanced information systems (IS). However, these sources can be deceived or under a third party’s control who can forge pieces of information produced by them. This raises new issues concerning trust one has in information, sources and IS affected. This article studies security of IS thanks to trust in sources. Definition then evaluation of trust in this context are introduced. Thus, a model of sources taking into account competence and sincerity is proposed. Those two features are studied and measured to allow trust’s evaluation. Simulations based on a real dataset shows relevance of our approach. This study is applied to ship’s navigation data analysis. © 2017 Lavoisier.
引用
收藏
页码:19 / 41
页数:22
相关论文
共 50 条
  • [41] Evolution and challenges in trust and security in information system infrastructures
    Information and Networked Systems Security Research , Dept. of Computing, Macquarie University, Sydney, NSW, Australia
    [J]. SIN - Proc. Int. Conf. Secur. Inf. Netw., (1-2):
  • [42] Trust Account Fraud and Effective Information Security Management
    Mubarak, Sameera
    [J]. JOURNAL OF DIGITAL FORENSICS SECURITY AND LAW, 2010, 5 (03) : 57 - 71
  • [43] Trust in information security technology: An intellectual property analysis
    Pigola, Angelica
    Meirelles, Fernando de Souza
    da Costa, Priscila Rezende
    Porto, Geciane Silveira
    [J]. WORLD PATENT INFORMATION, 2024, 78
  • [44] Extracting trust information from security system of a service
    Bahtiyar, Serif
    Caglayan, Mehmet Ufuk
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2012, 35 (01) : 480 - 490
  • [45] Security measurements of steganographic systems
    Zhang, WM
    Li, SQ
    [J]. APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, PROCEEDINGS, 2004, 3089 : 194 - 204
  • [46] Trust, Security and Privacy in Emerging Distributed Systems
    Abawajy, Jemal
    Wang, Guojun
    Yang, Laurence T.
    Javadi, Bahman
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2016, 55 : 224 - 226
  • [47] Tiered Trust for Useful Embedded Systems Security
    Ayers, Hudson
    Dutta, Prabal
    Levis, Philip
    Levy, Amit
    Pannuto, Pat
    Van Why, Johnathan
    Watson, Jean-Luc
    [J]. PROCEEDINGS OF THE 15TH EUROPEAN WORKSHOP ON SYSTEMS SECURITY (EUROSEC 22), 2022, : 15 - 21
  • [48] Silicon Systems Security and Building a Root of Trust
    Perez, Ronald
    [J]. 2015 IEEE ASIAN SOLID-STATE CIRCUITS CONFERENCE (A-SSCC), 2015, : 5 - 8
  • [49] Security and Trust in Forthcoming Consumer IoT Systems
    Herencsar, Norbert
    [J]. IEEE CONSUMER ELECTRONICS MAGAZINE, 2023, 12 (03) : 26 - 27
  • [50] Security, trust, and resilience of distributed networks and systems
    Su, Jinshu
    Wang, Xiaofeng
    Shi, Weisong
    Ray, Indrakshi
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (10) : 1829 - 1830